期刊
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
卷 60, 期 11, 页码 3023-3028出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2015.2409905
关键词
DoS attack; energy constraint; state estimation
资金
- NSFC [U1401253]
- National Program for Special Support of Top-Notch Young Professionals
- Fundamental Research Funds for Central Universities [2014XZZX003-25, NCET-11-0445]
- HKUST Caltech Partnership [FP004]
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据